Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

Size: px
Start display at page:

Download "Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation"

Transcription

1 Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation Ryan Farley and Xinyuan Wang Department of Computer Science George Mason University Fairfax, VA 22030, USA {rfarley3,xwangc}@gmu.edu Abstract. As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats. We show that crafted SIP traffic (noisy attack) can disable a Windows XP host that runs the official Vonage VoIP softphone within several minutes. While such a noisy attack can be effectively mitigated by threshold based filtering, we show that a stealthy attack could defeat the threshold based filtering and disable the targeted computer silently without ever ringing the targeted softphone. To mitigate the stealthy attack, we have developed a limited context aware (LCA) filtering that leverages the context and SIP protocol information to ascertain the intentions of a SIP message on behalf of the client. Our experiments show that LCA filtering can effectively defeat the stealthy attack while allowing legitimate VoIP calls to go through. Keywords: VoIP, Softphone, Security, Attack on Host, Host Defense. 1 Introduction As VoIP is getting increasingly popular, it becomes an attractive target to attackers [8]. Many known VoIP exploits stem from vulnerabilities of the de facto signaling protocol in use, Session Initiation Protocol (SIP) [16]. Previous works [27, 12, 8, 23] have shown that SIP weaknesses make it possible for the attackers to do such things as remotely monitor a call, modify billing control signals, and even implement voice pharming attacks. As with any device on the Internet, if a VoIP phone is vulnerable and unprotected, then an attacker can exploit it from anywhere in the world. In this paper we take an alternative point of view by focusing on the stability and security of the systems that host VoIP softphones. As with most network based applications softphones enlarge a device s attack surface, which increases the chance that an attacker can find a point of leverage and pivot to compromise the host machine. In this paper we case study the softphone provided by Vonage,

2 2 Farley, Wang which at one point had the largest US residential VoIP market share [13, 14], in order to investigate stability and security threats that a VoIP softphone can introduce to the host running it and how we can mitigate such threats. Specifically, we present two attacks against a Windows XP host running the official Vonage softphone. These attacks use crafted SIP messages and can make the Windows XP Host completely unusable until reboot. Indirectly, these attacks also prevent the victims from receiving incoming and making outgoing calls within seconds. The first attack (the noisy attack) can remotely disable a machine running the Vonage softphone by occupying all available physical and virtual memory within minutes. The second attack (the stealthy attack) takes longer to achieve the same effect, but it never rings the softphone. These attacks illustrate that weaknesses in a VoIP softphone can introduce fatal vulnerabilities to the host system. Few people may realize that, indeed, a vulnerable application can enable a remote attacker to completely disable the computer that runs the vulnerable application. We have investigated ways to mitigate the identified attacks from the network. We have first used threshold based filtering to detect the spikes in arrival rates of Invite messages, and we have found that it can effectively diminish the effects of the noisy attack by as much as 99.8%. However, threshold based filtering is not effective against the stealthy attack, which neither rings the softphone nor use abnormally high rate of SIP messages. We have designed the limited context aware (LCA) approach, which buffers all incoming packets in a waiting queue to determine whether they are attack related or safe legitimate traffic. Our experimental results show that our LCA method can eliminate 100% of the stealthy attack s packets without interfering with standard SIP operation. The rest of the paper is organized as follows. In section 2 we illustrate the basis of our two attacks by presenting signal flooding techniques to disable the operation of the softphone itself. We then present our two attacks for the softphone host in section 3, and two defense mechanisms against the identified attacks in section 4. In section 5, we empirically evaluate the two attacks and the effectiveness of our proposed defenses against them. We discuss the existing related work in section 7 and the implications of the identified attacks on a softphone host in section 6. Finally we conclude in section 8. 2 Background Session Initiation Protocol (SIP) [16], is a general purpose application layer signaling protocol used for creating, modifying, and terminating multimedia sessions, such as VoIP calls, among Internet endpoints known as User Agents (UAs). To facilitate locating UAs, all users in a SIP network are identified by a SIP Uniform Resource Identifier (URI), which typically includes an username and hostname in a format much like an address. Signaling between UAs is based on the request-response paradigm. A User Agent Client (UAC) sends requests to a User Agent Server (UAS) which then

3 Disabling a Computer by Exploiting Softphone Vulnerabilities 3 DNS Server Location Server Obtain Address of Inbound Proxy Server Obtain Address of UA-B SIP SIP SIP SIP Phone UA-A Outbound Proxy Server Atlanta.com (1) INVITE (2) INVITE (3) 100 Trying (4) INVITE (5) 100 Trying (6) 180 Ringing (7) 180 Ringing (8) 180 Ringing (9) 200 OK (10) 200 OK (11) 200 OK (12) ACK Media Session (13) BYE (14) 200 OK Inbound Proxy Server Boston.com SIP Phone UA-B Fig. 1. An example SIP message flow for a VoIP call. INVITE sip: @ :5060 SIP/2.0 Via: SIP/2.0/UDP :5061 Via: SIP/2.0/UDP :5060 Via: SIP/2.0/UDP :5060;branch=z9hG4bK8AE8A3914F0 From: "GMU" <sip: @ >;tag= To: <sip: @voncp.com> Call-ID: 58A8C0B-8D6F11DC-B8E18C7A C@ CSeq: 101 INVITE Contact: <sip: @ :5061> Max-Forwards: 13 X-Von-Relay: Content-Type: application/sdp Content-Length: 361 v=0 o=ciscosystemssip-gw-useragent IN IP s=sip Call c=in IP t=0 0 m=audio RTP/AVP c=in IP a=rtpmap:0 PCMU/8000 a=rtpmap:18 G729/8000 a=fmtp:18 annexb=no a=rtpmap:2 G726-32/8000 a=rtpmap:100 X-NSE/8000 a=fmtp: a=rtpmap:101 telephone-event/8000 a=fmtp: Fig. 2. An example SIP Invite message with SDP information. replies with both the appropriate response and a corresponding status code. An endpoint can function as both UAC and UAS at the same time. Figure 1 illustrates the message flow of a normal SIP VoIP session between UA-A and UA-B without authentication. Initially, A only knows the URI of B. Since this does not provide the specific location information needed to complete a call, A must send the Invite to its outbound proxy server, atlanta.com. Once atlanta.com resolves the URI, it forwards the Invite to the appropriate next hop, boston.com. Next, boston.com relays the Invite to B and sends a Trying back to atlanta.com, which is relayed to A. Once B receives the Invite, it sends a Ringing to A. When B finally answers the call, it sends a 200 Ok to A, to which A responds with an Ack. During this exchange, the packets also contain a session description protocol, or SDP. This establishes the voice data parameters each client will use, such as media codec and port numbers. Figure 2 shows an example of an Invite message with SDP information.

4 4 Farley, Wang SIP SIP UA-A Registrar/Proxy Server UA-B (1) REGISTER (2) 401 Unauthorized (3) REGISTER (Credentials) (4) 200 OK (5) INVITE (6) 407 Proxy-Authenticate Required (7) ACK (8) INVITE (Credentials) (9) INVITE (10) 200 OK (11) 200 OK (12) ACK Media Session (13) BYE (14) 407 Proxy-Authenticate Required (15) ACK (16) BYE (Credentials) (17) BYE (18) 200 OK (19) 200 OK Fig. 3. Typical registration, as well as call setup and termination. At the end of the call, the UAC that first hangs up sends a BYE to the other UAC. The other UAC then responds with a 200 Ok and terminates its RTP stream. Upon receiving the 200 Ok, the first UAC terminates its RTP stream as well. Based on HTTP digest authentication [3], SIP provides authentication of Invite, Register and Bye messages from UAC to UAS. Figure 3 illustrates the message flows of typical authenticated registration, call setup and termination. Because SIP does not require the UAC to authenticate the Invite message from UAS, most VoIP service providers (e.g., Vonage, AT&T) do not have authentication protection of the Invite message sent from the SIP server to SIP phone. This enables attackers to freely spoof Invite message and ring any targeted SIP phone with the spoofed Invite message. Once the Vonage softphone receives a spoofed Invite, it will keep ringing for 3 minutes unless the user picks up the softphone or a corresponding Cancel message is received. The SIP softphone will not ring for duplicate Call-IDs repeated within a certain period (60 seconds for the Vonage softphone). The Vonage softphone has two ports allocated for incoming RTP audio streams, creating a limit of two simultaneous phone lines. Therefore, attackers only need to send two spoofed Invite messages to occupy the two lines of the targeted Vonage softphone. In our experiments we have found that two things will happen when both lines of the Vonage softphone are ringing. First, all additional incoming call requests are given a Busy response. For legitimate calls routed through the client s proxy, this means that the caller is sent to voic . Second, since no line is free, the target can not make an outgoing call. If the target answers and hangs up on a fake Invite, then that line would become free until the next Invite arrives. For the Vonage softphone, lines become available again when audible ringing stops at three minutes. In other words, only two spoofed Invite messages are needed every three minutes to occupy both lines and prevent the softphone from

5 Attack Cancel Without Filter Disabling a Computer by Exploiting Softphone Vulnerabilities 5 With Filter Attack Cancel Legitimate Invite Attack Cancel (a) Noisy attack. (b) Stealthy attack. Fig. 4. Visualization of the Attack from Multiple Sources. receiving incoming calls. In the rest of this paper, we investigate how attackers can exploit the vulnerabilities of the SIP protocol and SIP softphones to disable a Windows XP host that runs the official Vonage SIP softphone. Legitima 3 Disabling the Softphone Host Most previous attacks on VoIP have targeted either the VoIP infrastructure (such as the proxy servers, billing systems, network usability, and fundamentals of SIP signaling) or the physical VoIP devices. It is not clear precisely how weaknesses in the softphone open the host up for attack. In the following sections we show how attackers can disable Windows XP machines running the official Vonage softphone. In section 3.1, we describe a host DoS attack that can consume a target machine s memory resources in minutes. In section 3.2, the attack is significantly refined into a slower but much stealthier form. 3.1 Noisy Attack on Softphone Host According to the SIP specification [16], the signaling processing at the the caller s and callee s sides are inherently stateful. In other words, the end UAC needs to allocate memory for keeping the state information for every Call-ID seen in any received Invite so that the UAC can respond to all requests that require repeated responses. For example, if all incoming lines are busy, up to three Busy responses over ten seconds are sent for every Invite request received. This enables attackers to deplete the memory of the host running SIP softphone. To launch such a noisy attack, the attacker only needs to make sure that each crafted Invite message has an unique Call-ID. The attacker can easily spoof the source IP address and launch the attack from distributed places as visualized in figure 4(a). Specifically, the attacker can send a large number of crafted Invite messages at a high rate (e.g., hundreds per second) to the targeted softphone. The recipient will only hear as many simultaneous rings as they have lines (e.g., Vonage

6 6 Farley, Wang Fig. 5. Screenshot of the memory usage of the Windows XP host before the attack. softphone has two lines). The high rate of crafted Invite messages will disable the softphone even if the user keeps hanging up the fake calls. Because the softphone will allocate memory for each incoming Invite message even if the phone lines are busy, a high rate (e.g., hundreds messages per second) of Invite messages can occupy almost all free physical memory on the host within a few minutes. As the attack continues and memory usage grows, if the system does not have enough RAM to handle the allocations, then the user will receive out of memory errors and excessive virtual memory page swaps will make the host completely unresponsive. The fundamental vulnerabilities here are: 1) the softphone needs to keep the state of every incoming Invite message as specified in the SIP RFC; 2) the deallocation of the memory can not keep up with the high rate of memory allocation triggered by the high rate of Invite messages. Therefore, even if the softphone can hang up (the fake calls) faster that the incoming Invite messages, the memory consumption would continue to increase and eventually lead to occupying all free memory of the host. We found these vulnerabilities are specific to the Invite message. Other SIP messages, such as Cancel and Bye do not have a similar effect on memory allocation. We implemented this attack and were able to deplete almost all available free memory of a Windows XP host running a Vonage softphone in just several minutes. The host begins thrashing indefinitely and is unusable until reboot. 3.2 Stealthy Attack on Softphone Host The noisy attack will cause the target softphone to ring if it is not used. From the attacker s point of view, it is desirable to attack the softphone host without ever ringing the softphone so that the softphone users will not be alerted. In SIP, the call initiator is allowed to send Cancel messages after sending out the Invite message. This essentially tells the receiver to ignore any Invite

7 Disabling a Computer by Exploiting Softphone Vulnerabilities 7 Fig. 6. Screenshot of the memory usage of the Windows host after the attack. The error message notes that the virtual memory is filled and the the swap file size needs to be increased. message that has the matching Call-ID. As a result, the receiver SIP phone will not ring. As indicated in figure 4(b), the stealthy attack exploits this feature of SIP by sending a number of Cancel messages with the matching Call-ID immediately after every Invite message is sent. While only one Cancel message is needed to silence the receiver SIP phone, multiple Cancel messages are used here to make sure any sent Invite message will not ring the receiver SIP phone even if some Cancel messages are lost in the network. Because of the n extra Cancel messages per Invite message, the rate of 1 Invite messages needs to be reduced to n+1 of that of noisy attack to avoid network congestion and packet loss. This slows down the memory consumption due to the attack and it takes longer to disable the softphone host. However, since the stealthy attack will never ring the softphone, it can remain undetected over a significantly longer time period. The end result is the same, almost all memory is occupied and the machine will need to be rebooted in order to be usable again. We have implemented this stealthy attack. The empirical results show significant effects on a target system within the first half-hour. It takes about two hours depending on the rate of Invite messages for the stealthy attack to deplete the host memory and disable the host completely. Figure 5 shows the memory usage and CPU utilization of the Windows XP host before the attack. The official Vonage softphone used less than 12MB memory and less than 7MB virtual memory file. The CPU utilization of the Windows XP host is only 2%.

8 Legitimate Legitimate Invite Invite Farley, Wang seconds seconds seconds seconds Threshold Filter Queue LCA Filter Queue seconds seconds Legitimate Invite seconds Legitimate Invite Invite Attack Cancel Arrival/Departure Rejection Arrival/Departure Rejection Next Next Packet in Queue in Queue (a) Packets are processed immediately. (b) Packets are held for one second, then processed. Fig. 7. Visualizations of the filter queueing systems. As shown in Figure 6, memory usage and CPU utilization of the Windows XP host went up significantly after an attack. Specifically, the attack has not only increased the memory usage of the Vonage softphone from 11MB to 190MB, but also increased its virtual memory usage from 6MB to 552MB. This effectively depleted the available free memory of the entire Windows XP host and caused it to hang. 4 Defense Mechanisms Proper defense against SIP spoofing attacks is not an easy solution without authentication or encryption. As discussed in section 2, the softphone is programmed to respond to even vaguely authentic looking signals, which makes it very difficult to distinguish between real and fake on a packet to packet basis. In order to make a decision, a grouping or series of packets must be analyzed. Of course, analyzing too many packets per grouping in the defense may introduce unacceptably high latency for SIP to remain operational. On the other hand, too few packets would make it hard for the defense to reliably determine whether the traffic is an attack or not. Analyzing only previous packets, such as with state machines, prevents the mechanism from blocking the beginning of attacks. This is a serious disadvantage if the attack only consists of unrelated single packets, such as our noisy DoS attack. There are some external factors that can guide the defense mechanism though. For instance, the average person should not expect to receive more than one or two calls a second. Anything more than that is probably due to network error or a flooding attack. For another example, if a call is cancelled by the caller before the callee would have a reasonable chance to answer, then it is unnecessary to ring the callee at all. There heuristics allow us to simplify the defense by excluding the those SIP messages that would not set up meaningful calls. Given previous work and noted limitations, we present two defense mechanisms for SIP flooding attacks. The threshold (TH) filter, in section 4.1, considers

9 Attack Cancel Attack Cancel Legitimate Invite Legitimate Invite Attack Cancel Without Filter With Filter Attack Cancel Legitimate Invite Attack Cancel Disabling a Computer by Exploiting Softphone Vulnerabilities 9 Legitimate Invite Legitimate Invite Attack Cancel Attack Cancel Without Filter Without Filter With Filter With Filter Attack Cancel Legitimate Invite (a) Noisy attack v. Threshold filter. Without Filter Legitimate Invite Attack Cancel (b) Stealthy attack v. LCA filter. Fig. 8. Attack and legitimate mixed streams with and without the filters activated. With Filter only one factor: Legitimate InvitetheAttack rate Invite at Attack which Cancel Invite messages are arriving. The limited context aware (LCA) filter, in section 4.2, queues Invite messages long enough to determine if there is any associated cancelling signals. If state machine based filtering can be thought of as using the past to guide decisions, then the threshold filter uses the present, and the LCA filter uses a slice of the relative future. 4.1 Defending against Noisy Attack with the Threshold Filter As detailed in section 3.1, the noisy attack consists of large number crafted Invite messages. To protected the softphone and its host, we want to filter out attack Invite messages while allowing legitimate Invite messages to pass. Ideally the filter should be able to definitively distinguish attack packets from legitimate traffic. Given that the whole attack Invite message can be crafted and spoofed by the attacker, there is no meaningful content pattern or signature in the Invite message we can use to distinguish attack Invite messages from legitimate Invite messages. In addition, the attack Invite messages can spoof the source IP address of legitimate SIP servers. Therefore, we can not filter the noisy attack based on source IP either. This leaves the arrival rate as the only usable detection factor anything above a certain arrival rate indicates that an attack is more than likely occurring. How do we decide on that threshold level? While it can change from user to user, we can safely assume that even a heavy telephone user should not expect more than one to two legitimate phone calls per second. Any higher rate of incoming calls can not be manually handled by a human. Figure 7(a) illustrates the filtering with threshold of one Invite message per second. For high rate (e.g., hundreds of attack Invite messages per second) noisy attack, threshold based filtering can be a very effective mitigation as it can filter out most, if not all attack Invite messages. However, threshold based filtering can still let very few attack Invite messages to reach the protected machine at the rate of no more than one attack Invite message per second as shown in figure 8(a). In addition, threshold based filtering has a very small chance to block legitimate Invite message while the high rate noisy attack is going on. This, however, is not a concern as the high rate noisy attack would have made the softphone unusable anyway.

10 10 Farley, Wang If the noisy attack uses a rate of Invite messages less than one per second, it will not be effectively blocked by the threshold based filtering. However, it would take much longer time for such a low rate noisy attack to deplete the memory of the softphone host. In addition, keeping ringing the softphone during such extended period of time (e.g., several hours) would most likely alert the softphone user. Therefore, low rate noisy attack is likely to be stopped before it causes real problem to the softphone and its host. The stealthy attack, on the other hand, would never ring the target softphone. This makes it unlikely to be noticed by the user of the targeted softphone. Since the stealthy attack has a much lower rate of Invite messages than the noisy attack, it can not be effectively filtered by the threshold based filter. Therefore, it is necessary to develop other defense against the stealthy attack. 4.2 Defending against Stealthy Attack with the LCA Filter As detailed in section 3.2, the stealthy attack sends a low rate of cancelled Invite messages, consuming memory slowly while preventing the target softphone from ringing. To filter such a stealthy attack with low rate Invite messages, we need to find some characteristics that can distinguish such stealthy attack from legitimate traffic. One unique characteristics of the stealthy attack is that every Invite message is followed by at least one Cancel message with matching Call-ID. This enables us to filter out the stealthy attack while allowing legitimate calls to go through. Specifically, we introduce a queue to temporarily hold every incoming SIP message for a fixed period of time T. Such a queue of incoming SIP messages gives us a limited context from which we can ascertain the intentions of the incoming SIP messages by looking for any Cancels associated with any Invite in the queue. As shown in figure 7(b), the queue consumer periodically checks the front packets in the queue. If the packet is an Invite, then the rest of the queue is searched for any Cancel message with a matching Call-ID). If any are found, then the Invite and the associated Cancels are dropped. If any packet in the queue has waited for at least the required time of T, we pull it off the queue and forward it along the incoming path. Note such a limited context aware filtering could indeed block legitimate Invite followed by legitimate Cancel caused by immediate hanging up after dialing the number. This is fine as the legitimate call has been cancelled by the caller already. The period of time T for the queue needs to be long enough to catch all the associated Cancel that can prevent the previous Invite from ringing the callee s SIP phone. On the other hand, it can not be too long to interfere with legitimate SIP signaling. For Vonage, if an Invite from a proxy server is held for more than 1.5 seconds, then the proxy automatically sends a Cancel. Thus 1.5 seconds is the upper limit of T. For the lower time limit, we must consider that it is advantageous for the attacker to send Cancels as soon as possible; the fewer they send and longer they wait, then the more likely that the softphone

11 Disabling a Computer by Exploiting Softphone Vulnerabilities 11 Memory Usage (MB) Softphone Memory Usage During Noisy Attack with No Filter Crash point Total RAM Total Used VM Used RAM Used Time (mins) Fig. 9. Details of the escalating memory usage during the Noisy DoS attack without the Threshold filter. might ring. In our limited context aware (LCA) filter, we use a one second wait time. By searching for an associated Cancel, the LCA filter has a way to distinguish calls that should be allowed from those that shouldn t. This eliminates any dependency of the effectiveness on the arrival rate. As seen in figure 8(b), the LCA filter can effectively filter all the stealthy attack traffic while virtually never blocking legitimate traffic. The only theoretical false positive is when the (31 hexadecimal digits) Call-ID of a Cancel message from a stealthy attack happens to match that of a legitimate Invite message. 5 Experiments To prove the concept of the attack and defense, we have implemented both the noisy and the stealthy attacks in Linux, the threshold based and LCA filters within the transparent network bridge in FreeBSD using divert sockets. We have conducted two sets of experiments. In section 5.1 we demonstrate the effect of both noisy and stealthy attacks on the softphone host by measuring the memory usage caused by the attacks. In section 5.2 we analyze the effectiveness of the defense mechanisms, and present the overhead required to implement both filtering systems. The target for these experiments is a virtual machine of 256 MB RAM running Windows XP and the X-PRO Vonage 2.0 softphone, release 1105x build stamp To avoid sending unnecessary outbound traffic, we have filtered out any replies related to our attack traffic. 5.1 Attacks We created the initial Invite template from a PCAP trace of a legitimate call captured at the target s gateway. While this is the easiest solution given

12 12 Farley, Wang our setup, it is possible for the attacker to gather enough information through other means and create a template from scratch without a man-in-the-middle, or MITM. For instance, the proxy server IP addresses are relatively static if the target s geographical location is known and the attacker could scan the target s open ports to see which the softphone is using. This means that an attacker can execute this threat from anywhere in the world as long as they know the target s IP address. The memory usage over the course of the noisy DoS attack is detailed in figure 9. Note that in the first minute there was a dramatic climb in the softphone s memory usage from 17MB to 161MB. Also, the processor utilization rose to % as soon as the flooding began. In nine minutes, the Vonage softphone has occupied over 500MB virtual memory and almost all 256MB RAM. By the sixteenth minute, as in shown in figure 6, the system has been resizing the swap file, the processor has become still swamped, and the UI has become completely unresponsive. The system did not return to usable state, even after several days, until rebooted. Figure 11(b) shows the the memory usage of the Vonage softphone under the stealthy DoS attack. The memory usage growth under stealthy attack is much slower than the noisy DoS attack, and the processor utilization does not spike as soon as flooding begins. The end result is the same though, after roughly two hours, the Windows XP host will have no free memory and an UI that remains unresponsive until the system is rebooted. For these attacks, the average memory allocated per Invite was 13KB. This is slightly higher, 49KB, during the first minute of the noisy attack. Considering that only the Call-ID had to be changed, and it has 31 hexadecimal digits, then this could theoretically consume even large memory systems. 5.2 Defense Mechanisms In this section we analyze the effectiveness of the defense mechanisms against their associated attacks. Additionally, we present the maximum packet handling rate and the overhead of the filters. We have conducted experiments with various combinations of attacks and the filters: 1) threshold filter against noisy attack; 2) threshold filter against stealthy attack; 3) LCA filter against stealthy attack; and 4) combination of LCA filter and threshold filter (LCA filter first and threshold filter second) against stealthy attack. Since the LCA filter is only effective against stealthy attack, we do not test LCA filter against noisy attack. Figure 10 shows the measured effectiveness, in term of attack packets blocked, of various filters against various attacks. Specifically, the threshold filter is able to block 99.8% of the noisy DoS attack and 95.6% of the stealthy attack at their maximum rate of Invite. This illustrates that the threshold filter s effectiveness decreases if the Invite arrival rate decreases. Note that the threshold filter can not block Cancels, so only 15.2% of all attack traffic was blocked. In addition, the threshold filter has a slight chance to block legitimate Invite messages since it does not distinguish legitimate and illegitimate Invite messages. The LCA

13 Disabling a Computer by Exploiting Softphone Vulnerabilities 13 Percentage of s Blocked Effectiveness of Filters Noisy v. TH Stealthy v. TH Stealthy v. LCA Stealthy v. Both Attack Type v. Filter to Measure Fig. 10. Effectiveness of the filters against the various attacks measured by percent of attack INVITE messages blocked. Memory Usage (MB) Crash point No filter Threshold filter Baseline Softphone Memory Usage During Noisy Attack Time (mins) (a) Noisy attack with and without the Threshold filter. Memory Usage (MB) Crash point No filter LCA Filter Baseline Softphone Memory Usage During Stealthy Attack Time (mins) (b) Stealthy attack with and without the LCA filter. Fig. 11. Comparison of the escalating memory usage during the attacks with and without a filter. filter, on the other hand, is able to block 100% the stealthy DoS attack at any capacity. In the LCA filter experiments, we mixed the legitimate Invite messages (from legitimate calls) with stealthy attack Invite messages. The LCA filter has never blocked any legitimate Invite messages mixed within the stealthy attack traffic. In summary, the threshold filter and LCA filter are complementing each other, and the combination of them are effective against both noisy and stealthy attacks. We have measured the memory consumption caused by the noisy and stealthy attacks as well as the impact of the threshold based filtering and the LCA filtering. As seen in figure 11(a), the threshold filter effectively slows down the memory growth during a noisy attack. Without any filtering, noisy attack has consumed 813 MB of memory of the softphone host in 16 minutes. With threshold filtering, noisy attack has only occupied 67.7 MB in 16 minutes. Figure 11(b) compares the memory consumptions of the stealthy attack with and without the LCA filtering. The LCA filtering has successfully prevented the stealthy attack from occupying additional memory from the softphone host.

14 14 Farley, Wang Packets per second Maximum Capacity for Attack Traffic Arrival Rates Send Rate Block Rate Receive Rate 0 Noisy v. None Noisy v. THStealthy v. None Stealthy v. TH Stealthy v. LCA Stealthy v. Both Attack Type v. Filter to Measure Fig. 12. An approximation of throughput for the filters under the DoS attacks. Latency (msecs) with 95% Confidence Noisy v. None Noisy v. THStealthy v. None Latency of Filters Stealthy v. TH Stealthy v. LCA Stealthy v. Both Attack Type v. Filter to Measure Fig. 13. Latency caused by the filters packet processing under the DoS attacks with confidence intervals. We have measured the maximum throughput (i.e., fastest packet rate without packet loss due to congestion) of both the noisy and stealthy attacks with and without threshold and LCA filtering. As shown in figure 12, noisy attack can achieve rate of about 300 Invite per second. Threshold filtering can handle rate close to 600 Invite per second. While maximum rate of stealthy attack is less than 250 Invite per second, LCA filtering can handle rate close to 500 Invite per second. Per RFC 2544, we have measured the processing latency of our filters at the maximum throughput. As shown in figure 13, the threshold filter introduces no more than one millisecond processing delay when running against either the noisy or stealthy attack. The LCA filter adds less than five milliseconds processing delay in addition to one second queueing delay. Neither the one second queueing delay nor the processing delay has shown any noticeable impact on the normal VoIP signaling functionality in our experiments.

15 6 Discussion Disabling a Computer by Exploiting Softphone Vulnerabilities 15 The host disabling attacks we present in this paper are relatively straight forward to implement. In fact, since the softphone chooses a predictable port number, the attacker only needs to know the target s IP address. Our experience shows that when the Vonage softphone is behind a NAT enabled router, often the external mapping retains the internal port number. Therefore, to disable a targeted softphone behind NAT, the attacker only needs the public IP address of the targeted softphone, which can be easily obtained by observing any SIP traffic from the targeted softphone anywhere along its path. Since the process of spoofing SIP messages implies changing the source IP address, and optionally the caller ID information, there is an innate layer of stealth in the attack. While host disabling attacks described in sections 3.1 and 3.2 are conducted against the Vonage softphone, they are actually exploiting features defined in the SIP protocol. Therefore, these attacks could be applicable to other softphones as well. It is one of our future works to investigate if other softphones are vulnerable to the newly identified attacks. Besides our proposed network based mitigation, enforcing the SIP authentication on Invite messages from the SIP server to the SIP phone could help mitigate the newly identified attacks. To prevent the replay of authenticated Invite messages to the SIP phone, the SIP phone needs to challenge each authenticated Invite message to it. This would introduce substantial overhead to the SIP phone. To the best of our knowledge, no US residential VoIP service provider enforces the authentication of SIP messages from the SIP server to the SIP phone. 7 Related Work Early VoIP security work primarily focused on analyzing the vulnerabilities and potential exploits of VoIP protocols and their implementations. McGann and Sicker [11] analyzed the potential security threats in SIP-based VoIP, creating an invisible listening post and modifying negotiation information on the fly. Geneiatakis et al. [4] surveyed the security vulnerabilities in SIP. Later work focused more on demonstrating exploits on current VoIP systems rather than illustrating potential exploits. Me and Verdone [12] detailed several VoIP attacks over insecure wireless networks. State [23] showed that it is possible to exploit the implementation vulnerabilities of a SIP stack in order to make any targeted GXV-3000 SIP phone accept calls from a remote attacker without ringing or user interaction. Zhang et al. [27] demonstrated that vulnerabilities in SIP can be used to launch billing attacks on currently deployed commercial VoIP services. Wang et al. [24] investigated the trust of several leading VoIP services (e.g., Vonage, AT&T) and showed that their VoIP calls can be transparently diverted and redirected leading to voice pharming attacks on the VoIP users. It has been further detailed [26] that these call diversion attacks can be launched by a remote attacker who is not initially in the path of VoIP traffic of the target.

16 16 Farley, Wang Lee et al. [10] showed how flooding attacks can cause constant ringing on the target UAC but did not discuss the effects on host resources. Herculea et al. [7] surveyed eight VoIP flooding attacks and arrival rates, but did not address host resource effects. Seedorf et al. [17] demonstrated single message attacks for eight SIP UAC implementations, but did not discuss remotely disabling the host. Kapravelos et al. [9] detailed arrival rates and cancelling a pending call, but did not claim that their attack is silent nor discussed its effects on the host. To the best of our knowledge, no previous work discusses how crafted SIP messages can be used to remotely disable a host that executes VoIP applications. On the other side of the line significant work exists in securing VoIP. Geneiatakis et al. [5] surveyed SIP security mechanisms. In a later paper, Geneiatakis et al. [6] detailed memory usage of a SIP proxy under a flooding attack but did not discuss effects of such an attack on the UAC host. Additionally, they presented a bloom filter system to track call state in order to detect Invite floods. However, unlike our LCA filter, once a flood is detected their system can not distinguish legitimate packets. Reynolds and Ghosal [15] proposed a multi-protocol scheme to defend against flooding attacks on VoIP networks. Wu et al. [25] and Sengar et al. [18] presented using state information and cross-protocol correlation to detect denial-of-service attacks on VoIP. Sengar et al. [19] detailed a VoIP intrusion detection based interactive protocol state machine. Deng and Shore [2] proposed using nonces to protect the SIP servers from flooding attacks. Kapravelos et al. [9] presented a flow state based filter mechanism for preventing nuisance dialing but did not address false positive rates. Soupionis et al. [22] detailed an audio based anti-bot verification method and more formal methods later [20, 21]. In general, most existing VoIP defense mechanisms are designed to protect the VoIP servers, and be deployed close to them, rather than end hosts such as SIP softphones. Additionally, most existing detection methods are somewhat post-mortem and do not provide real-time flood protection while guaranteeing to keep legitimate VoIP calls alive against the attacks that we have described. To the best of our knowledge there is no existing work focused on securing against SIP messages that can remotely disable a host executing VoIP applications. 8 Conclusion VoIP is a quickly growing dependence for modern communication needs. Unfortunately, its benefits come with an increased risk of attacks from the Internet. Most current exploits (e.g., billing attacks and remote eavesdropping attempts), however, have focused on the VoIP devices (e.g., servers, clients) or users. To the best of our knowledge, we are the first to demonstrate that an attacker can completely disable the very host that runs vulnerable VoIP applications. We have developed two attacks that can disable a Windows XP computer running the official Vonage softphone. The noisy attack, which rings the targeted softphone, can disable the targeted Windows XP host within a few minutes. The stealthy attack, which never rings the targeted softphone, can completely disable the targeted Windows XP host within a couple of hours. Both versions

17 Disabling a Computer by Exploiting Softphone Vulnerabilities 17 can be launched from anywhere in the world as long as the target s IP address is known. Given the large subscriber base of VoIP and the ease of implementing such attacks, this is a viable threat to systems stability and security. To mitigate the host disabling attacks, we have designed and evaluated two network based defense mechanisms. The threshold based filtering has very low overhead and can block 99.8% of the attack traffic at its maximum rate. However, threshold based filtering is not effective against slow and stealthy attacks and can block critical portions of legitimate VoIP traffic. Limited context aware (LCA) filtering can reliably filter all stealthy attack traffic while allowing virtually all legitimate traffic to pass in real-time. Therefore, the combination of threshold and LCA filters are effective against both the noisy attack and stealthy attack. References 1. Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., Haukka, T.: Security Mechanism Agreement for the SIP. RFC 3329 (Jan 2003) 2. Deng, X., Shore, M.: Advanced Flooding Attack on a SIP Server. In: Proc. of the Intl. Conf. on Availability, Reliability and Security (ARES). pp IEEE Computer Society (March 2009) 3. Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP Authentication: Basic and Digest Access Authentication. RFC 2617 (Jun 1999) 4. Geneiatakis, D., Dagiouklas, A., Kambourakis, G., Lambrinoudakis, C., Gritzalis, S., Ehlert, S., Sisalem, D.: Survey of Security Vulnerabilities in Session Initiation Protocol. IEEE Commun. Surveys and Tutorials 8 (3), (2006) 5. Geneiatakis, D., Kambourakis, G., Dagiuklas, T., Lambrinoudakis, C., Gritzalis, S.: SIP Security Mechanisms: A State-of-the-Art Review. In: Proc. of the 5th Intl. Netw. Conf. (INC). pp ACM (2005) 6. Geneiatakis, D., Vrakas, N., Lambrinoudakis, C.: Utilizing Bloom Filters for Detecting Flooding Attacks against SIP based Services. Computers & Security 28(7), (2009) 7. Herculea, M., Blaga, T., Dobrota, V.: Evaluation of Security and Countermeasures for SIP-Based VoIP Architecture. pp (Aug 2008) 8. Jaques, R.: Cyber-Criminals Switch to VoIP Vishing, vnunet/news/ /cyber-criminals-talk-voip 9. Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., Markatos, E.: D(ei)aling with VoIP: Robust Prevention of DIAL Attacks. Proc. of the 15th European Symp. on Research in Computer Security (ESORICS) (2010) 10. Lee, C., Kim, H., Ko, K., Kim, J., Jeong, H.: A VoIP Traffic Monitoring System based on NetFlow v9. Intl. Journal of Advanced Science and Technology 4 (2009) 11. McGann, S., Sicker, D.C.: An Analysis of Security Threats and Tools in SIP-Based VoIP Systems. In: Proc. of the 2nd Workshop on Securing VoIP (Jun 2005) 12. Me, G., Verdone, D.: An Overview of Some Techniques to Exploit VoIP over WLAN. In: Proc. of 2006 Intl. Conf. on Digital Telecommun. (Aug 2006) 13. Moskalyuk, A.: US VoIP Market Shares (Aug 2006), ITFacts/?p= Now, V.: Vonage Is Still #1 In VoIP Market Share (Jul 2006), voipnow.org/2006/07/vonage_is_still.html

18 18 Farley, Wang 15. Reynolds, B., Ghosal, D.: Secure IP Telephony using Multi-layered Protection. In: Proc. of the 10th Netw. and Distrib. Syst. Security Symp. (NDSS) (Feb 2003) 16. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC Seedorf, J., Beckers, K., Huici, F.: Single-Message Denial-of-Service Attacks Against Voice-over-Internet Protocol Terminals. Intl. Journal of Electronic Security and Digital Forensics 2, 29 34(6) (2009) 18. Sengar, H., Wijesekera, D., Wang, H., Jajodia, S.: Denial of Service Attacks on IP Telephony. In: Proc. of the 14th IEEE Intl. Workshop on Quality of Service (IWQoS). IEEE Computer Society (Jun 2006) 19. Sengar, H., Wijesekera, D., Wang, H., Jajodia, S.: VoIP Intrusion Detection Through Interacting Protocol State Machines. In: Proc. of the Intl. Conf. on Dependable Syst. and Netw. (DSN). pp IEEE Computer Society (2006) 20. Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D.: A Formally Verified Mechanism for Countering SPIT. In: Proc. of Conf. on Critical Information Infrastructures Security (CRITIS). pp (2010) 21. Soupionis, Y., Gritzalis, D.: ASPF: Adaptive anti-spit Policy-based Framework. In: Proc. of the Intl. Conf. on Availability, Reliability and Security (ARES). pp (2011) 22. Soupionis, Y., Tountas, G., Gritzalis, D.: Audio CAPTCHA for SIP-Based VoIP. In: Proc. of 24th IFIP Intl. Information Security Conf. (SEC). pp (2009) 23. State, R.: Remote eavesdropping with SIP Phone GXV-3000 (Aug 2007), http: // 24. Wang, X., Zhang, R., Yang, X., Jiang, X., Wijesekera, D.: Voice Pharming Attack and the Trust of VoIP. In: Proc. of the 4th Intl. Conf. on Security and Privacy in Commun. Netw. (SecureComm). pp ACM (2008) 25. Wu, Y.S., Bagchi, S., Garg, S., Singh, N., Tsai, T.: SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. In: Proc. of the Intl. Conf. on Dependable Syst. and Netw. (DSN). pp IEEE Computer Society (Jul 2004) 26. Zhang, R., Wang, X., Farley, R., Yang, X., Jiang, X.: On the Feasibility of Launching the Man-in-the-Middle Attacks on VoIP from Remote Attackers. In: Proc. of the 4th Intl. Symp. on Information, Computer, and Commun. Security (ASIACCS). pp ACM (Mar 2009) 27. Zhang, R., Wang, X., Yang, X., Jiang., X.: Billing Attacks on SIP-Based VoIP Systems. In: Proc. of the 1st USENIX WOOT (Aug 2007)

How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker

How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems Ruishan Zhang 1, Xinyuan Wang 1, Xiaohui Yang 1, Ryan Farley 1, and Xuxian Jiang 2 1 George Mason University, Fairfax,

More information

How To Attack A Phone With A Billing Attack On A Sip Phone On A Cell Phone On An At&T Vpn Vpn Phone On Vnet.Com (Vnet) On A Pnet Vnet Vip (Sip)

How To Attack A Phone With A Billing Attack On A Sip Phone On A Cell Phone On An At&T Vpn Vpn Phone On Vnet.Com (Vnet) On A Pnet Vnet Vip (Sip) Billing Attacks on SIP-Based VoIP Systems Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang Department of Information and Software Engineering George Mason University, Fairfax, VA 22030, USA {rzhang3,

More information

A VoIP Traffic Monitoring System based on NetFlow v9

A VoIP Traffic Monitoring System based on NetFlow v9 A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,

More information

Voice Pharming Attack and the Trust of VoIP

Voice Pharming Attack and the Trust of VoIP Voice Pharming Attack and the Trust of VoIP Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera Department of Computer Science George Mason University Fairfax, VA 22030, USA {xwangc,

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

User authentication in SIP

User authentication in SIP User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia

More information

A Call Conference Room Interception Attack and its Detection

A Call Conference Room Interception Attack and its Detection A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,

More information

Media Gateway Controller RTP

Media Gateway Controller RTP 1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza. SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks

Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks William Conner and Klara Nahrstedt Department of Computer Science, University of Illinois at Urbana-Champaign {wconner,klara}@uiuc.edu

More information

Adaptation of TURN protocol to SIP protocol

Adaptation of TURN protocol to SIP protocol IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,

More information

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119 SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers

More information

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and

More information

NTP VoIP Platform: A SIP VoIP Platform and Its Services

NTP VoIP Platform: A SIP VoIP Platform and Its Services NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP

More information

Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models

Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models Dongwon Seo, Heejo Lee, and Ejovi Nuwere Abstract The Session Initiation Protocol (SIP) has been used

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation

More information

Session Initiation Protocol Security Considerations

Session Initiation Protocol Security Considerations Session Initiation Protocol Security Considerations Sami Knuutinen Helsinki University of Technology Department of Computer Science and Engineering May 28, 2003 Abstract Session Initiation Protocol (SIP)

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

Prevention of Anomalous SIP Messages

Prevention of Anomalous SIP Messages International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication

More information

How to make free phone calls and influence people by the grugq

How to make free phone calls and influence people by the grugq VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Three-Way Calling using the Conferencing-URI

Three-Way Calling using the Conferencing-URI Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

SIP: Protocol Overview

SIP: Protocol Overview SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright

More information

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,

More information

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol Intesab Hussain, Soufiene Djahel, Dimitris Geneiatakis ±, and Farid Naït-Abdesselam LIPADE, University of

More information

AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)

AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk) AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk) 1. Login to CID (Customer ID) Login https://manager.agile.ne.jp/login.php USERNAME Password 2. Go to SIP List of SIP TRUNK SIP SIP List Buy SIP Trunk

More information

Unregister Attacks in SIP

Unregister Attacks in SIP Unregister Attacks in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Interdisciplinary Center Herzliya Email: {bremler,halachmi.ronit}@idc.ac.il Jussi Kangasharju Darmstadt University of Technology jussi@tk.informatik.tu-darmstadt.de

More information

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi

More information

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea

More information

SIP Security in IP Telephony

SIP Security in IP Telephony SIP Security in IP Telephony Muhammad Yeasir Arafat and M. Abdus Sobhan School of Engineering and Computer Science Independent University, Bangladesh E-mail: sobhan30@gmail.com Abstract Today the session

More information

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into

More information

Transparent weaknesses in VoIP

Transparent weaknesses in VoIP Transparent weaknesses in VoIP Peter Thermos peter.thermos@palindrometech.com 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,

More information

Voice Over IP (VoIP) Denial of Service (DoS)

Voice Over IP (VoIP) Denial of Service (DoS) Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Denial of Service (DoS) is an issue for any IP network-based

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,

More information

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163. Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China

More information

SIP ALG - Session Initiated Protocol Applications- Level Gateway

SIP ALG - Session Initiated Protocol Applications- Level Gateway SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks

More information

Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007.

Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and

More information

A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise

A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,

More information

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application

More information

Session Initiation Protocol and Services

Session Initiation Protocol and Services Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application

More information

A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment

A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment Dimitris Geneiatakis and Costas Lambrinoudakis Laboratory of Information and Communication Systems Security

More information

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW 3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

Multimedia Communication in the Internet. SIP Security Threads. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1

Multimedia Communication in the Internet. SIP Security Threads. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1 Multimedia Communication in the Internet SIP Security Threads Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1 Denial of Service Prevent service availability Software vulnerabilities

More information

Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0

Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

An Overview on Security Analysis of Session Initiation Protocol in VoIP network

An Overview on Security Analysis of Session Initiation Protocol in VoIP network An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor

More information

Denial of Services on SIP VoIP infrastructures

Denial of Services on SIP VoIP infrastructures Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University ge.zhang@kau.se 1 Outline Background Denial of Service attack using DNS Conclusion 2 VoIP What is VoIP? What is its advantage?

More information

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation

More information

Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721

Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721 Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

SIP-based VoIP Traffic Behavior Profiling and Its Applications

SIP-based VoIP Traffic Behavior Profiling and Its Applications SIP-based VoIP Traffic Behavior Profiling and Its Applications Hun Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan and Antonio Nucci Abstract With the widespread adoption of SIP-based VoIP, understanding

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

Evaluating DoS Attacks Against SIP-Based VoIP Systems

Evaluating DoS Attacks Against SIP-Based VoIP Systems Evaluating DoS Attacks Against SIP-Based VoIP Systems M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq Next Generation Intelligent Networks Research Center (nexgin RC) FAST National University of Computer

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.

More information

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite

More information

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars

More information

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Jethro Beekman Christopher Thompson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2013-18

More information

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree.

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com. David Schwartz Director, Telephony Research davids@deltathree. Baruch Sterman, Ph.D. Chief Scientist baruch@deltathree.com David Schwartz Director, Telephony Research davids@deltathree.com Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted

More information

Session Initiation Protocol

Session Initiation Protocol TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: acpang@csie.ntu.edu.tw

More information

Detecting DoS Attacks on SIP Systems

Detecting DoS Attacks on SIP Systems Detecting DoS Attacks on SIP Systems Eric. Chen TT Information Sharing Platform Laboratories, TT Corporation 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585, Japan TEL: +81-422-59-3347, FAX: +81-422-59-5660

More information

Sangheon Pack, EunKyoung Paik, and Yanghee Choi

Sangheon Pack, EunKyoung Paik, and Yanghee Choi 1 Design of SIP Server for Efficient Media Negotiation Sangheon Pack, EunKyoung Paik, and Yanghee Choi Multimedia & Communication Laboratory, Seoul National University, Korea ABSTRACT Voice over IP (VoIP)

More information

A Federated Model for Secure Web-Based Videoconferencing

A Federated Model for Secure Web-Based Videoconferencing A Federated Model for Secure Web-Based Videoconferencing Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, and Mudassir Fajandar Interdisciplinary Telecommunications Dept. and Dept. of Computer Science

More information

Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks

Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Two-Stage Forking for SIP-based VoIP Services

Two-Stage Forking for SIP-based VoIP Services Two-Stage Forking for SIP-based VoIP Services Tsan-Pin Wang National Taichung University An-Chi Chen Providence University Li-Hsing Yen National University of Kaohsiung Abstract SIP (Session Initiation

More information

Request for Comments: 4579. August 2006

Request for Comments: 4579. August 2006 Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities

A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities N.J Croft and M.S Olivier April 2005 Information and Computer Security Architectures Research Group Department

More information

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address

More information

A Phased Framework for Countering VoIP SPAM

A Phased Framework for Countering VoIP SPAM International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1

More information

SIP Trunking & Peering Operation Guide

SIP Trunking & Peering Operation Guide SIP Trunking & Peering Operation Guide For Samsung OfficeServ May 07, 2008 doc v2.1.0 Sungwoo Lee Senior Engineer sungwoo1769.lee@samsung.com OfficeServ Network Lab. Telecommunication Systems Division

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Il protocollo SIP Session Initiation Protocol (SIP) SIP is the IETF s standard for establishing VoIP connections It is an application layer control protocol for creating, modifying and terminating sessions

More information

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,

More information

Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks

Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks Security of VoIP Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Science in Computer

More information

AV@ANZA Formación en Tecnologías Avanzadas

AV@ANZA Formación en Tecnologías Avanzadas SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0. Version 1

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0. Version 1 BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0 Version 1 BroadWorks Guide Copyright Notice Trademarks Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation

More information

A Novel Distributed Wireless VoIP Server Based on SIP

A Novel Distributed Wireless VoIP Server Based on SIP A Novel Distributed Wireless VoIP Server Based on SIP Yuebin Bai 1,Syed Aminullah 1, Qingmian Han 2, Ding Wang 1, Tan Zhang 1,and Depei Qian 1 1 (School of Computer Science and Engineering, Beihang University,

More information

VoIP. What s Voice over IP?

VoIP. What s Voice over IP? VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as

More information

Finding VoIP vulnerabilities while you sleep

Finding VoIP vulnerabilities while you sleep Finding VoIP vulnerabilities while you sleep Background info on VoIP and previous research Introduction to VoIPER Description of some of its features Some demos and usage examples The results of my testing

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

SIP Session Initiation Protocol

SIP Session Initiation Protocol SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications reveillere@enseirb.fr Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would

More information

SIP Essentials Training

SIP Essentials Training SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through

More information